ScanVerify Scan Report ------------------ SUMMARY - Number of hosts which were alive during the test : 1 - Number of security holes found : 0 - Number of security warnings found : 0 - Number of security notes found : 11 TESTED HOSTS 63.241.84.101 (Security notes found) DETAILS + 63.241.84.101 : . List of open ports : o https (443/tcp) (Security notes found) o general/tcp (Security notes found) o http (80/tcp) (Security notes found) . Information found on port https (443/tcp) A TLSv1 server answered on this port . Information found on port https (443/tcp) Synopsis : The remote web server contains a 'robots.txt' file. Description : The remote host contains a file named 'robots.txt' that is intended to prevent web 'robots' from visiting certain directories in a web site for maintenance or indexing purposes. A malicious user may also be able to use the contents of this file to learn of sensitive documents or directories on the affected site and either retrieve them directly or target them for other attacks. See also : http://www.robotstxt.org/wc/exclusion.html Solution : Review the contents of the site's robots.txt file, use Robots META tags instead of entries in the robots.txt file, and/or adjust the web server's access controls to limit access to sensitive material. Risk factor : None Contents of robots.txt : User-agent: * Disallow: /media/ Disallow: /images/ Disallow: /stylesheets/ Disallow: /javascript/ Disallow: /event.ng/ Disallow: /services/site/registration/ Other references : OSVDB:238 . Information found on port https (443/tcp) Synopsis : Some information about the remote HTTP configuration can be extracted. Description : This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive and HTTP pipelining are enabled, etc... This test is informational only and does not denote any security problem Solution : None. Risk factor : None / CVSS Base Score : 0 (AV:R/AC:L/Au:NR/C:N/A:N/I:N/B:N) Plugin output : Protocol version : HTTP/1.1 SSL : yes Pipelining : yes Keep-Alive : no Options allowed : HEAD, GET, PUT, POST, DELETE, TRACE, OPTIONS, MOVE, INDEX, MKDIR, RMDIR Headers : Server: Sun-ONE-Web-Server/6.1 Date: Sun, 23 Sep 2007 00:11:14 GMT Content-length: 0 Content-type: text/html Location: http://www.latimes.com/ . Information found on port https (443/tcp) Synopsis : A web server is running on the remote host. Description : This plugin attempts to determine the type and the version of the remote web server. Risk factor : None Plugin output : The remote web server type is : Sun-ONE-Web-Server/6.1 . Information found on port https (443/tcp) This web server is [mis]configured in that it does not return '404 Not Found' error codes when a non-existent file is requested, perhaps returning a site map, search page or authentication page instead. CGI scanning will be disabled for this host. . Information found on port https (443/tcp) Here is the SSLv3 server certificate: Certificate: Data: Version: 3 (0x2) Serial Number: 7f:93:54:57:f3:cf:fc:b7:16:90:7f:0f:4a:34:17:d8 Signature Algorithm: sha1WithRSAEncryption Issuer: O=VeriSign Trust Network, OU=VeriSign, Inc., OU=VeriSign International Server CA - Class 3, OU=www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign Validity Not Before: Jun 13 00:00:00 2007 GMT Not After : Jun 20 23:59:59 2008 GMT Subject: C=US, ST=Illinois, L=Chicago, O=Tribune Company, OU=Interactive, OU=Terms of use at www.verisign.com/rpa (c)00, CN=www.latimes.com Subject Public Key Info: Public Key Algorithm: rsaEncryption RSA Public Key: (1024 bit) Modulus (1024 bit): 00:bd:92:5f:c3:16:3c:05:81:40:19:22:e4:49:18: ff:98:52:44:74:a2:09:e9:eb:81:c3:a9:3b:60:31: 73:42:0e:04:a1:21:aa:e9:64:ad:64:97:a5:d6:3a: 86:94:54:9a:94:6e:92:fd:16:bf:f7:8d:30:f7:5b: f8:1e:ae:69:ee:93:a6:83:16:0a:17:08:ba:16:b9: 84:ea:1d:c5:c9:bd:84:20:9d:54:fb:e1:95:08:ef: 08:7b:a8:6f:12:c4:16:f9:2b:8a:9b:ba:4c:0d:12: 64:86:97:1f:c9:f0:b5:01:e4:9a:7f:76:d8:88:a7: 1f:4b:91:ad:58:9a:a7:27:1b Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Basic Constraints: CA:FALSE X509v3 Key Usage: Digital Signature, Key Encipherment X509v3 CRL Distribution Points: URI:http://crl.verisign.com/Class3InternationalServer.crl X509v3 Certificate Policies: Policy: 2.16.840.1.113733.1.7.23.3 CPS: https://www.verisign.com/rpa X509v3 Extended Key Usage: Netscape Server Gated Crypto, TLS Web Server Authentication, TLS Web Client Authentication Authority Information Access: OCSP - URI:http://ocsp.verisign.com 1.3.6.1.5.5.7.1.12: 0_.].[0Y0W0U..image/gif0!0.0...+..............k...j.H.,{..0%.#http://logo.verisign.com/vslogo.gif Signature Algorithm: sha1WithRSAEncryption 5e:9a:5f:b8:1f:8d:6a:08:7a:e4:38:12:22:f6:5a:5f:fa:65: 22:3d:4f:b0:87:3e:f7:8b:61:5e:f5:f8:3a:b7:77:24:1e:e7: 54:46:a6:85:0b:03:f8:cc:df:8c:5e:b5:1f:da:1c:42:8c:32: 05:da:68:fb:4a:44:b2:b8:13:5b:03:a1:74:91:74:c1:11:11: 69:2c:8e:5b:ad:2e:a1:9f:93:a2:b2:ac:41:76:9f:e0:1a:d8: 17:a8:91:6a:21:72:e9:ca:87:9d:0f:47:34:af:d9:ea:bd:6c: a7:84:72:5d:a8:70:53:f3:79:f7:15:01:d8:12:db:72:de:60: 27:37 This TLSv1 server does not accept SSLv2 connections. This TLSv1 server also accepts SSLv3 connections. . Information found on port https (443/tcp) Synopsis : The remote service encrypts communications using SSL. Description : This script detects which SSL ciphers are supported by the remote service for encrypting communications. See also : http://www.openssl.org/docs/apps/ciphers.html Risk factor : None Plugin output : Here is a list of the SSL ciphers supported by the remote server : High Strength Ciphers (>= 112-bit key) SSLv3 RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5 RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1 TLSv1 RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5 RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} . Information found on port https (443/tcp) A web server is running on this port through SSL . Information found on port general/tcp Information about this scan : Plugin feed version : 200706261111 Type of plugin feed : Release Scanner IP : 208.109.250.18 Port range : default Thorough tests : no Experimental tests : no Paranoia level : 0 Report Verbosity : 1 Safe checks : yes Optimize the test : yes Max hosts : 20 Max checks : 4 Scan Start Date : 2007/9/22 17:00 Scan duration : 1185 sec . Information found on port general/tcp The following ports were open at the beginning of the scan but are now closed: Port 80 was detected as being open but is now closed This might be an availability problem related which might be due to the following reasons : - The remote host is now down, either because a user turned it off during the scan - A network outage has been experienced during the scan, and the remote network cannot be reached from the Vulnerability Scanner any more - This Vulnerability Scanner has been blacklisted by the system administrator or by automatic intrusion detection/prevention systems which have detected the vulnerability assessment. In any case, the audit of the remote host might be incomplete and may need to be done again . Information found on port http (80/tcp) A web server is running on this port ------------------------------------------------------ This file was generated by the ScanVerify Security Scanner